or Oracle Releases 254 Security Fixes By packetstormsecurity.com Published On :: Fri, 20 Apr 2018 01:24:33 GMT Full Article headline flaw patch oracle java
or Researcher Says NSA's Ghidra Tool Can Be Used For RCE By packetstormsecurity.com Published On :: Wed, 20 Mar 2019 13:34:51 GMT Full Article headline hacker flaw nsa java
or Sega Loses Data For 1.3 Million Customers By packetstormsecurity.com Published On :: Sun, 19 Jun 2011 20:47:41 GMT Full Article headline hacker data loss sega
or Scientologist Overlord Declares Victory Over Anonymous By packetstormsecurity.com Published On :: Fri, 17 Dec 2010 16:26:25 GMT Full Article headline hacker religion
or Anonymous Denies Westboro Attack By packetstormsecurity.com Published On :: Wed, 23 Feb 2011 01:20:35 GMT Full Article headline hacker religion
or Vatican Kudos For Hackers By packetstormsecurity.com Published On :: Thu, 07 Apr 2011 13:28:19 GMT Full Article headline hacker religion
or Kournikova Worm Marks Tenth Anniversary By packetstormsecurity.com Published On :: Fri, 11 Feb 2011 15:30:14 GMT Full Article headline malware worm
or Stuxnet Scored Quick Hit On First Target, Says Researcher By packetstormsecurity.com Published On :: Tue, 15 Feb 2011 04:40:49 GMT Full Article headline malware worm symantec iran
or Iran Says It Was Attacked By Second Computer Worm By packetstormsecurity.com Published On :: Mon, 25 Apr 2011 23:49:54 GMT Full Article headline worm iran
or Security Failings At Siemens Could Lead To An Attack Worse Than Stuxnet By packetstormsecurity.com Published On :: Thu, 26 May 2011 13:52:07 GMT Full Article headline worm scada
or Worm Spreading Via RDP By packetstormsecurity.com Published On :: Mon, 29 Aug 2011 14:01:07 GMT Full Article headline microsoft worm
or New Worm By Creators Of Stuxnet Is Suspected By packetstormsecurity.com Published On :: Wed, 19 Oct 2011 04:22:00 GMT Full Article headline worm
or Worm Wriggles Through Year-Old Flaw, Builds Zombie-Net By packetstormsecurity.com Published On :: Wed, 26 Oct 2011 14:35:22 GMT Full Article headline flaw worm java
or Danger Worm Hijacks Facebook Accounts To Inject Banking Trojan By packetstormsecurity.com Published On :: Tue, 29 Nov 2011 16:49:19 GMT Full Article headline bank trojan worm facebook
or Worm Steals 45,000 Facebook Passwords, Researchers Say By packetstormsecurity.com Published On :: Fri, 06 Jan 2012 00:31:34 GMT Full Article headline malware worm facebook social
or Facebook Koobface Worm 'Hacker Gang Named' By packetstormsecurity.com Published On :: Tue, 17 Jan 2012 16:06:00 GMT Full Article headline hacker worm facebook
or 'Super-Powerful' Flame Worm Actually Boring Bloatware By packetstormsecurity.com Published On :: Thu, 31 May 2012 16:51:20 GMT Full Article headline malware worm
or US Identified As Stuxnet Perpetrator With Obama's Backing By packetstormsecurity.com Published On :: Sat, 02 Jun 2012 06:43:15 GMT Full Article headline government malware usa cyberwar worm iran
or Rare AutoCAD Worm Lifted Blueprints From Peru, Sent Them To China By packetstormsecurity.com Published On :: Fri, 22 Jun 2012 03:47:39 GMT Full Article headline malware china cybercrime flaw worm
or Dorkbot Ransomware Worm Targets Skype Users By packetstormsecurity.com Published On :: Mon, 08 Oct 2012 17:12:07 GMT Full Article headline malware bank worm skype
or Analysis Of The Skype Worm By packetstormsecurity.com Published On :: Wed, 10 Oct 2012 01:56:17 GMT Full Article headline worm skype
or New Table-Munching Worm Ravages Iranian Biz Databases By packetstormsecurity.com Published On :: Mon, 26 Nov 2012 15:17:21 GMT Full Article headline database worm iran
or Eight-Year Nortel Hacking Operation Again Shows Enterprise Vulnerabilities By packetstormsecurity.com Published On :: Fri, 17 Feb 2012 16:09:48 GMT Full Article headline hacker china flaw nortel
or Microsoft Workstation Service NetpManageIPCConnect Overflow By packetstormsecurity.com Published On :: Thu, 31 Dec 2009 03:20:56 GMT This Metasploit module exploits a stack overflow in the NetApi32 NetpManageIPCConnect function using the Workstation service in Windows 2000 SP4 and Windows XP SP2. In order to exploit this vulnerability, you must specify a the name of a valid Windows DOMAIN. It may be possible to satisfy this condition by using a custom dns and ldap setup, however that method is not covered here. Although Windows XP SP2 is vulnerable, Microsoft reports that Administrator credentials are required to reach the vulnerable code. Windows XP SP1 only requires valid user credentials. Also, testing shows that a machine already joined to a domain is not exploitable. Full Article
or Oracle Weblogic Apache Connector POST Request Buffer Overflow By packetstormsecurity.com Published On :: Fri, 18 May 2012 14:58:27 GMT This Metasploit module exploits a stack based buffer overflow in the BEA Weblogic Apache plugin. The connector fails to properly handle specially crafted HTTP POST requests, resulting a buffer overflow due to the insecure usage of sprintf. Currently, this module works over Windows systems without DEP, and has been tested with Windows 2000 / XP. In addition, the Weblogic Apache plugin version is fingerprinted with a POST request containing a specially crafted Transfer-Encoding header. Full Article
or Microsoft DHCP INFORM Configuration Overwrite By packetstormsecurity.com Published On :: Fri, 30 May 2014 04:49:27 GMT A vulnerability in Windows DHCP was found on Windows OS versions ranging from Windows 2000 through to Windows server 2003. This vulnerability allows an attacker to remotely overwrite DNS, Gateway, IP Addresses, routing, WINS server, WPAD, and server configuration with no user interaction. Successful exploitation of this issue will result in a remote network configuration overwrite. Microsoft acknowledged the issue but has indicated no plans to publish a patch to resolve it. Full Article
or Mandriva Linux Security Advisory 2004.146 By packetstormsecurity.com Published On :: Sun, 12 Dec 2004 18:24:27 GMT Mandrake Linux Security Update Advisory - SGI developers discovered a remote DoS (Denial of Service) condition in the NFS statd server. rpc.statd did not ignore the SIGPIPE signal which would cause it to shutdown if a misconfigured or malicious peer terminated the TCP connection prematurely. Full Article
or Mandriva Linux Security Advisory 2004.148 By packetstormsecurity.com Published On :: Thu, 30 Dec 2004 06:59:44 GMT Mandrake Linux Security Update Advisory - Herbert Xu discovered that iproute can accept spoofed messages sent via the kernel netlink interface by other users on the local machine. This could lead to a local Denial of Service attack. Full Article
or Mandriva Linux Security Advisory 2005.029 By packetstormsecurity.com Published On :: Sat, 05 Feb 2005 20:49:38 GMT Mandrake Linux Security Update Advisory - Javier Fernandez-Sanguino Pena discovered two vulnerabilities in scripts included with the vim editor. The two scripts, tcltags and vimspell.sh created temporary files in an insecure manner which could allow a malicious user to execute a symbolic link attack or to create, or overwrite, arbitrary files with the privileges of the user invoking the scripts. Full Article
or Secunia Security Advisory 18489 By packetstormsecurity.com Published On :: Thu, 19 Jan 2006 02:04:53 GMT Secunia Security Advisory - Mandrake has issued an update for hylafax. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and by malicious users to compromise a vulnerable system. Full Article
or lesstif-advisory.pdf By packetstormsecurity.com Published On :: Fri, 18 Aug 2006 03:47:58 GMT Lesstif local root exploit for Mandrake Linux 2006 that makes use of the mtink binary which is setuid by default. Full Article
or Mexican Drug Runners Torture And Decaptitate Blogger By packetstormsecurity.com Published On :: Thu, 10 Nov 2011 15:46:59 GMT Full Article headline anonymous mexico
or 93 Million Mexican Voters Have Had Their Information Compromised By packetstormsecurity.com Published On :: Mon, 25 Apr 2016 14:01:58 GMT Full Article headline government privacy data loss mexico
or A 'Hacker' Exposed A Drug Lord And Is Trying To Save His Own Life By packetstormsecurity.com Published On :: Thu, 18 May 2017 14:15:13 GMT Full Article headline government cyberwar mexico
or ICE Forces Software To Automatically Recommend Detention By packetstormsecurity.com Published On :: Wed, 27 Jun 2018 00:08:27 GMT Full Article headline government usa mexico
or Anomalous-Payload-based-Worm-Detection-and-Signature-Generation.pdf By packetstormsecurity.com Published On :: Wed, 01 Nov 2006 16:23:02 GMT Anomalous Payloadbased Worm Detection and Signature Generation. Full Article
or Advanced-Polymorphic-Worms.pdf By packetstormsecurity.com Published On :: Wed, 01 Nov 2006 16:23:02 GMT Advanced Polymorphic Worms: Evading IDS by Blending with Normal Traffic. Full Article
or Worminator-bin.tgz By packetstormsecurity.com Published On :: Wed, 06 Dec 2006 02:38:14 GMT A Win32 tool for easing/automating the process of creating IDS/IPS signatures for SMTP based worms, providing a comfortable GUI, including raw base64 variants and Snort signatures support. This tarball is the binary executable version. Full Article
or Worminator-src.tgz By packetstormsecurity.com Published On :: Wed, 06 Dec 2006 02:38:51 GMT A Win32 tool for easing/automating the process of creating IDS/IPS signatures for SMTP based worms, providing a comfortable GUI, including raw base64 variants and Snort signatures support. This tarball is the source version. Full Article
or Exploit Web 2.0, Real Life XSS-Worm By packetstormsecurity.com Published On :: Thu, 05 Feb 2009 22:08:04 GMT Whitepaper called Exploiting Web 2.0, Real Life XSS-Worm. Full Article
or Sasser Worm avserve FTP PORT Buffer Overflow By packetstormsecurity.com Published On :: Thu, 26 Nov 2009 00:34:53 GMT This Metasploit module exploits the FTP server component of the Sasser worm. By sending an overly long PORT command the stack can be overwritten. Full Article
or LPRng use_syslog Remote Format String Vulnerability By packetstormsecurity.com Published On :: Wed, 17 Feb 2010 23:45:41 GMT This Metasploit module exploits a format string vulnerability in the LPRng print server. This vulnerability was discovered by Chris Evans. There was a publicly circulating worm targeting this vulnerability, which prompted RedHat to pull their 7.0 release. They consequently re-released it as "7.0-respin". Full Article
or PHP-Nuke 7.0 / 8.1 / 8.1.35 Wormable Remote Code Execution By packetstormsecurity.com Published On :: Wed, 05 May 2010 00:53:06 GMT PHP-Nuke versions 7.0, 8.1 and 8.1.35 wormable remote code execution exploit. Full Article
or Wormtrack Network IDS 0.1 By packetstormsecurity.com Published On :: Thu, 10 Nov 2011 02:38:15 GMT Wormtrack is a network IDS that helps detect scanning worms on a local area network by monitoring anomalous ARP traffic. This allows detection of scanning threats on the network, without having privileged access on a switch to set up a dedicated monitor port, nor does it require a constant updating of the rules engine to address new threats. Full Article
or Linksys Worm Remote Root By packetstormsecurity.com Published On :: Mon, 17 Feb 2014 20:02:22 GMT Proof of concept exploit used by the recent Linksys worm (known as "Moon"). Exploits blind command injection in tmUnblock.cgi. Full Article
or Metamorphic Worms: Can They Remain Hidden? By packetstormsecurity.com Published On :: Mon, 02 Feb 2015 10:22:22 GMT Whitepaper that discusses types of computer worms and how metamorphic worms differ from the rest. Full Article
or Morris Worm fingerd Stack Buffer Overflow By packetstormsecurity.com Published On :: Mon, 05 Nov 2018 21:05:50 GMT This Metasploit module exploits a stack buffer overflow in fingerd on 4.3BSD. This vulnerability was exploited by the Morris worm in 1988-11-02. Cliff Stoll reports on the worm in the epilogue of The Cuckoo's Egg. Full Article
or Morris Worm sendmail Debug Mode Shell Escape By packetstormsecurity.com Published On :: Mon, 05 Nov 2018 21:09:02 GMT This Metasploit module exploits sendmail's well-known historical debug mode to escape to a shell and execute commands in the SMTP RCPT TO command. This vulnerability was exploited by the Morris worm in 1988-11-02. Cliff Stoll reports on the worm in the epilogue of The Cuckoo's Egg. Currently only cmd/unix/reverse and cmd/unix/generic are supported. Full Article
or Advertiser Settles Charges For Use Of Adobe Flash Cookies By packetstormsecurity.com Published On :: Wed, 09 Nov 2011 00:53:12 GMT Full Article headline adobe cookiejacking
or Anonymous Takes Down Greek Sites In Support Of Athens Protests By packetstormsecurity.com Published On :: Tue, 14 Feb 2012 00:46:29 GMT Full Article headline denial of service anonymous greece